диссертация (1169257), страница 34
Текст из файла (страница 34)
25.09.2015. — Режим59.доступа:http://www.bbc.com/news/world-asia-china-34360934(датаобращения:20.01.2017).60.Alice MacGregor. China, U.S. making moves to implement cybersecurityagreements//TheStack.—14.06.2016.Режимдоступа:https://thestack.com/security/2016/06/14/china-u-s-making-moves-to-implementcybersecurity-agreements/ (дата обращения: 25.01.2017).61.SaysNafeesa Syeed. U.S. Cyber Deal With China Is Reducing Hacking, Official//Bloomberg.28.06.2016.—Режимдоступа:https://www.bloomberg.com/news/articles/2016-06-28/u-s-cyber-deal-with-china-isreducing-hacking-official-says (дата обращения: 23.01.2017).62.Christina Larson, Keith Zhai, David Ramli, Yuan Gao.
China AdoptsCybersecurity Law Despite Foreign Opposition // Bloomberg. 07.11.2016. — Режимдоступа:https://www.bloomberg.com/news/articles/2016-11-07/china-passes-cybersecurity-law-despite-strong-foreign-opposition (дата обращения: 11.01.2017).63.Nate Raymond. U.S. accuses Chinese citizens of hacking law firms, insidertrading // Рейтр. 28.12.2016. — Режим доступа: http://www.reuters.com/article/us-cyberinsidertrading-idUSKBN14G1D5 (дата обращения: 28.01.2017).17264.Tony Ware. US, China hold third dialogue on jointly battling cybercrime //Federal Times. 09.12.2016.
— Режим доступа: http://www.federaltimes.com/articles/uschina-hold-third-dialogue-on-jointly-battling-cybercrime (дата обращения: 20.01.2017).65.Chen Weihua. China, US to do more on cyber crime // China Daily.08.12.2016.—Режимдоступа:http://usa.chinadaily.com.cn/world/2016-12/08/content_27617161.htm (дата обращения: 14.01.2017).66.Aliya Sternstein. PENTAGON PLANS TO DEPLOY MORE THAN 100CYBER TEAMS BY LATE 2015 // Nextgov.
19.03.2013. — Режим доступа:http://www.nextgov.com/defense/2013/03/pentagon-plans-deploy-more-100-cyber-teamslate-2015/61948/ (дата обращения: 30.05.2016).67.Jeff Blagdon. Pentagon cybersecurity force to grow fivefold under multi-yearexpansion//TheVerge.28.01.2013.—Режимдоступа:http://www.theverge.com/2013/1/28/3923742/pentagons-cybersecurity-force-to-growfivefold-under-multi-year (дата обращения: 30.05.2016).68.Andrea Shalal-Esa. Four-star general in eye of U.S.
cyber storm // ChicagoTribune. 26.05. 2013. — Режим доступа: http://www.chicagotribune.com/news/sns-rt-us(датаcybersecurity-nsa-alexanderbre94p06s-20130526,0,313800.storyобращения:30.05.2016).69.//Ellen Nakashima. Obama signs off on nomination of Rogers as NSA directorTheWashingtonPost.25.01.2016.—Режимдоступа:https://www.washingtonpost.com/world/national-security/obama-signs-off-on-nominationof-rogers-as-nsa-director/2014/01/25/bc54378c-85f7-11e3-801fe3ff2ca3fab6_story.html?utm_term=.9313739351d9 (дата обращения: 15.01.2017).70.notaSpencer Ackerman .
NSA chief Michael Rogers: Edward Snowden probablyforeignspy//TheGuardian.03.06.2014.—Режимдоступа:https://www.theguardian.com/world/2014/jun/03/nsa-chief-michael-rogers-edwardsnowden-probably-not-spy (дата обращения: 11.01.2017).173Siobhan Gorman. NSA Director Warns of ‘Dramatic’ Cyberattack in Next71.Decade//TheWallStreetJournal.20.11.2014.—Режимдоступа:https://www.wsj.com/articles/nsa-director-warns-of-dramatic-cyberattack-in-next-decade1416506197 (дата обращения: 20.01.2017).72.workingEllen Nakashima. Cyber chief: Efforts to deter attacks against the U.S.
are not//TheWashingtonPost.19.03.2015.—Режимдоступа:https://www.washingtonpost.com/world/national-security/head-of-cyber-command-usmay-need-to-boost-offensive-cyber-powers/2015/03/19/1ad79a34-ce4e-11e4-a2a79517a3a70506_story.html?utm_term=.e4bd21055aaa (дата обращения: 11.01.2017).73.Sean Lyngaas. Intel chiefs say cyber norms, deterrence strategy still elusive //FCW. 10.09.2015. — Режим доступа: https://fcw.com/articles/2015/09/10/intel-cybernorms.aspx (дата обращения: 24.01.2017).74.Ellen Nakashima.
Pentagon and intelligence community chiefs have urgedObama to remove the head of the NSA // The Washington Post. 19.11.2016. — Режимдоступа:https://www.washingtonpost.com/world/national-security/pentagon-and-intelligence-community-chiefs-have-urged-obama-to-remove-the-head-of-thensa/2016/11/19/44de6ea6-adff-11e6-977a1030f822fc35_story.html?utm_term=.ea1cb58a5329 (дата обращения: 19.01.2017).75.Alex Thompson. They could walk — U.S. intelligence officials warn agentscould quit en masse if Trump keeps mocking them // VICE News. 05.01.2017.
— Режимдоступа: https://news.vice.com/story/us-cyber-command-chief-says-agents-could-quit-indroves-if-trump-keeps-mocking-them (дата обращения: 25.01.2017).76.ChairmanKen Hu. Huawei Open Letter by Deputy Chairman of Huawei Technologies,ofHuaweiUSA.—Режимдоступа:http://in.reuters.com/article/2013/05/10/usa-cyberweaponsidINDEE9490AX20130510?type=economicNews (дата обращения: 30.05.2016).77.Eric Engleman.
Huawei, ZTE Provide Opening for China Spying, Report Says// Bloomberg. 08.10.2012. — Режим доступа: http://www.bloomberg.com/news/2012-10-17407/huawei-zte-provide-opening-for-china-spying-report-says.html(датаобращения:30.05.2016).Huawei and ZTE pose security threat, warns US panel // BBC. 08.10.2012. —78.Режим доступа: http://www.bbc.co.uk/news/business-19867399 (дата обращения:30.05.2016).79.Steven R.
Weisman. Investigative Report on the U.S. National SecurityIssues Posed by Chinese Telecommunications Companies Huawei and ZTE // The NewYorkTimes.—21.02.2008.Режимдоступа:http://www.nytimes.com/2008/02/21/business/worldbusiness/21iht3com.1.10258216.html?pagewanted=all&_r=2& (дата обращения: 30.05.2016).80.Cao Kai. U.S.
Congress report on Huawei, ZTE is far from convincing //Xinhuanet.15.10.2012.—Режимдоступа:(датаhttp://news.xinhuanet.com/english/indepth/2012-10/15/c_131907860.htmобращения: 30.05.2016).81.Andrew S. Ross. China firms' risk to U.S. unproved // San Francisco Gate.13.10.2012. — Режим доступа: http://www.sfgate.com/business/bottomline/article/Chinafirms-risk-to-U-S-unproved-3945749.php (дата обращения: 30.05.2016).82.Anita Chang Beattie . Can Huawei's Latest Branding Campaign 'Make ItPossible'? // Ad Age. 26.02.2013. — Режим доступа: http://adage.com/article/globalnews/huawei-slatest-branding-campaign-makit/240032/ (дата обращения: 30.05.2016).83.Kathrin Hille, Paul Taylor.
Huawei 'not interested in US any more' afterrepeated denials for market access // CNN. 24.04.2013. — Режим доступа:http://edition.cnn.com/2013/04/24/business/huawei-not-interested-us (дата обращения:30.05.2016).84.tradeDaniel Bases. Exclusive: EU cites Chinese telecoms Huawei and ZTE forviolations//Reuters.18.05.2013.—Режимдоступа:http://www.reuters.com/article/2013/05/18/us-trade-eu-idUSBRE94H03J20130518обращения: 30.05.2016).(дата175Sprint deal puts US in China cyber attack danger // Gulfnews.
25.05.2013. —85.Режимдоступа:http://gulfnews.com/business/telecoms/sprint-deal-puts-us-in-china-cyber-attack-danger-1.1188235 (дата обращения: 30.05.2016).86.David E. Aanger, Nicole Perlroth. N.S.A. Breached Chinese Servers Seen asSecurity Threat // The New York Times. 22.03.2014. — Режим доступа:https://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-asspy-peril.html (дата обращения: 12.01.2017).87.Dan Worth.
Huawei does not pose UK national security threat // V3.25.03.2015. — Режим доступа: http://www.v3.co.uk/v3-uk/news/2401447/huawei-doesnot-pose-uk-national-security-threat (дата обращения: 10.01.2017).Иван Лебедев. "Лаборатория Касперского" планирует открыть офис в88.Вашингтоне и продавать свою продукцию правительству США // ТАСС-Телеком.16.05.2013. — Режим доступа: http://tasstelecom.ru/news/one/19571 (дата обращения:30.05.2016).89.Kaspersky Plans Increased Sales to US Government // Voice of America.15.05.2013. — Режим доступа: http://www.voanews.com/content/kaspersky-plansincreased-sales-to-us-government/1661786.html (дата обращения: 30.05.2016).Report on Reuters Cybersecurity Summit 2013 // Reuters.
16.05.2013. —90.Режимдоступа:http://graphics.thomsonreuters.com/13/05/CybersecuritySummit.pdf(дата обращения: 30.05.2016).Noah Shachtman. Russia’s Top Cyber Sleuth Foils US Spies, Helps Kremlin91.Pals//Wired.23.07.2012.—http://www.wired.com/dangerroom/2012/07/ff_kaspersky/all/Режим(датадоступа:обращения:30.05.2016).92.Andrew Blake. Trump puts Kaspersky Lab ban into law with signing ofdefense-spending bill // The Washington Post. 13.12.2017.
— Режим доступа:https://www.washingtontimes.com/news/2017/dec/13/donald-trump-codifies-kasperskylab-ban-ndaa/ (дата обращения: 14.12.2017).176CNN: российские хакеры взломали компьютеры Белого дома // РИА93.Новости. 08.04.2015. — Режим доступа: https://ria.ru/world/20150408/1057248046.html(дата обращения: 16.01.2017).The Financial Times: Россия мобилизовала элитную группу кибер-воинов94.//ЕвропейскаяПравда.24.02.2017.—http://www.eurointegration.com.ua/rus/news/2017/02/24/7062155/Режимдоступа:(датаобращения:22.01.2017).Евгений Салтыков.